@@ -172,7 +172,7 @@ discard block |
||
| 172 | 172 | // value is scalar |
| 173 | 173 | if (array_key_exists($x509_attr, $client_cert_data['subject'])) { |
| 174 | 174 | $value = $client_cert_data['subject'][$x509_attr]; |
| 175 | - Logger::info('authX509: cert ' . $x509_attr . ' = ' . $value); |
|
| 175 | + Logger::info('authX509: cert '.$x509_attr.' = '.$value); |
|
| 176 | 176 | $entry = $this->findUserByAttribute($attr, $value); |
| 177 | 177 | if ($entry !== null) { |
| 178 | 178 | $dn = $attr; |
@@ -208,7 +208,7 @@ discard block |
||
| 208 | 208 | } |
| 209 | 209 | |
| 210 | 210 | if (empty($ldap_certs)) { |
| 211 | - Logger::error('authX509: no certificate found in LDAP for dn=' . $dn); |
|
| 211 | + Logger::error('authX509: no certificate found in LDAP for dn='.$dn); |
|
| 212 | 212 | $state['authX509.error'] = "UNKNOWNCERT"; |
| 213 | 213 | $this->authFailed($state); |
| 214 | 214 | |
@@ -227,7 +227,7 @@ discard block |
||
| 227 | 227 | $pem = $cryptoUtils->der2pem($ldap_cert); |
| 228 | 228 | $ldap_cert_data = openssl_x509_parse($pem); |
| 229 | 229 | if ($ldap_cert_data === false) { |
| 230 | - Logger::error('authX509: cert in LDAP is invalid for dn=' . $dn); |
|
| 230 | + Logger::error('authX509: cert in LDAP is invalid for dn='.$dn); |
|
| 231 | 231 | continue; |
| 232 | 232 | } |
| 233 | 233 | |
@@ -243,7 +243,7 @@ discard block |
||
| 243 | 243 | } |
| 244 | 244 | } |
| 245 | 245 | |
| 246 | - Logger::error('authX509: no matching cert in LDAP for dn=' . $dn); |
|
| 246 | + Logger::error('authX509: no matching cert in LDAP for dn='.$dn); |
|
| 247 | 247 | $state['authX509.error'] = "UNKNOWNCERT"; |
| 248 | 248 | $this->authFailed($state); |
| 249 | 249 | |